Many people believe that leaving their computer unattended won’t pose any security risks as long as their device is locked. However, researcher Rob Fuller, of R5 Industries demonstrates that an attacker with physical access to your device can access your login details in seconds.
Category Archives: Security Knowledge
The Internet of Things is a growing area that seems to have no boundaries. It was only a matter of time before it would catch up with the sex toy industry. Malware can infect any internet capable device allowing access to the most private details of pleasure seekers.
Ransomware has become a highly lucrative profit earner for cyber criminals. So much so that hackers are now sabotaging the malware of their competitors to secure their share of victims.
We spoke with Michael Gillespie at Malware Hunter Team, a group of researchers who share our commitment to protecting you and your data, have developed a website that will allow you to find out what type of ransomware your computer has been infected with and if there is a decryption tool available.
Our lab works to crack new strains of ransomware and as a result are often at the receiving end of abuse from hackers who can no longer profit from their malware. Recently, the abuse has become personal with abuse being coded directly into new variants aimed directly at Fabian, the head of our Malware Lab.
Ransomware is now the most consistently problematic type of malware to effect internet capable devices and businesses. A solid protection suite is vital but there is a second important step to protect your data – Backup.
Life support machines can be the difference between life and death. But did you know they can also be an easy access point for hackers to access hospital networks and steal private patient information?
Pokemon Go has taken over cities worldwide, but has it also given hackers access to take over your phone?
Cybercrime has not been deterred by modern security methods. With data being held for ransom and banking fraud running rampant, individual users are at a greater risk than ever.
New ransomware threats appear almost daily. This week the Emsisoft Team took a look at a new ransomware family which reared it’s ugly head around two months ago and began hurling abuse at our staff. Meet Apocalypse, learn how it works and how you can protect your data.
Potentially Unwanted Programs slow down your system and can be harmful: Here’s what can you do about it
What is a PUP? The Emsisoft team offers advice to recognize unwanted programs and practical tips on how to remove them.
PUPs. The great minds at Emsisoft have not only researched this topic quite intensely in our latest blogpost, we also set up a video for you to review step by step how our Emsisoft Anti-Malware software can protect you from nasty PUPs. So you can now actually sit back and watch some awesome ideas how to get rid of nasty PUPs.
Ever wondered what you’d do if your laptop, tablet or smartphone was stolen? While the use of security software to protect you from online attacks is common, what about physical threats to your hardware?
Read here how to protect your data in the case of hardware loss…
There is one reoccuring topic within the industry which eventually makes it into the news: Ransomware. Data blackmail is an easy way for criminal hackers to make money – with businesses being an easy target. Supermarkets, Wholesale, Petrol Stations – even hospitals are endangered and need to take the precaution of being prepared.
At Emsisoft, we take this global threat more than serious – for years. What happens if ransomware happens, how it happens and what to do before and after – we’ve taken a deeper look in behind the scenes of cyber criminality nowadays and offer solutions and advice.